[nsp-sec] Headsup Akamai: phishing site; headsup others: possible phishers
John Payne
john at sackheads.org
Tue Jul 8 12:06:53 EDT 2008
On Jul 8, 2008, at 10:22 AM, SURFcert - Peter wrote:
> ----------- nsp-security Confidential --------
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Hello,
>
> We have had a report about a phishing site for Wellsfargo. Upon
> investigation we found the site was using information located on what
> seems an Akamai server:
>
> https://a248.e.akamai.net/f/248/1856/90m/www.wellsfargo.com/
https://a248.e.akamai.net/ is a grandfathered-in gross hack for
customers who don't want full SSL delivery of all their objects but
also don't want mixed-content warnings.
If you go to www.wellsfargo.com, the little logo at the top is:
https://a248.e.akamai.net/f/248/1856/90m/www.wellsfargo.com/img/hp/
logo_62sq.gif
for example. There is a whitelist of what can be served based upon a
customer code that's hidden in that URL string.
>
> We don't know if this is a legimite Wellsfargo site but other links to
> Wellsfargo information (images and things like that) used the real
> www.wellsfargo.com URL.
>
> The phishers had also installed a nstview package but that didn't work
> because the scripts in wwgf.php weren't allowed to run from the
> location
> it was uploaded to.
>
> That scripts was accessed from a number of IP addresses:
>
> AS | IP | AS Name
> 9050 | 92.80.161.84 | RTD RTD-ROMTELECOM Autonomous System
> Number
> 12491 | 81.199.5.32 | IPPLANET-AS IPPlanet
> 14778 | 74.6.17.156 | INKTOMI-LAWSON - Inktomi Corporation
> 12491 | 81.199.5.78 | IPPLANET-AS IPPlanet
> 16422 | 77.220.3.111 | NEWSKIES-NETWORKS - New Skies
> Networks, Inc.
> 26228 | 64.151.82.172 | SERVEPATH - ServePath, LLC
> 33776 | 41.219.204.206 | STARCOMMS-ASN
> 24900 | 212.112.242.89 | IPX-SERVER IPX Server GmbH
> 6517 | 209.120.218.130 | RELIANCEGLOBALCOM - Reliance Globalcom
> Services, Inc
>
> Timestamps range from 12/Jun/2008:13:47:10 +0200 to 02/Jul/
> 2008:21:15:09
> +0200 and can be provided.
>
> - --
> Peter Peters
> SURFcert Officer on Duty
> cert at surfnet.nl http://cert.surfnet.nl/
> office-hours: +31 302 305 305 emergency (24/7): +31 622 923 564
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.2 (MingW32)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
>
> iD8DBQFIc3gbelLo80lrIdIRAofrAJ9MAhgJ342k4xf4L00mB/Gg9J95GgCeOpad
> RBRMxr5/RCtPT1rd0yI4rAY=
> =37Ud
> -----END PGP SIGNATURE-----
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-
> security
> community. Confidentiality is essential for effective Internet
> security counter-measures.
> _______________________________________________
>
More information about the nsp-security
mailing list